1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
9

Your windows system is used by several people, so you want increase security by requiring users to create passwords that are at

least ten characters long. You also want to prevent log on after three unsuccessful attempts.
Computers and Technology
1 answer:
yanalaym [24]3 years ago
3 0

Answer:

You need to configure your account policies for Account Lockout Threshold and Minimum Password Length.

Explanation:

The Account lockout threshold policy setting determines the number of failed sign-in attempts that will cause a local account to be locked. A locked account cannot be used until an administrator unlocks it or until the number of minutes specified by the Account lockout duration policy setting expires. This is security setting determines the least number of characters that a password for a user account may contain. You can set a value of between 1 and 14 characters, or establish that no password is required by setting the number of characters to 0.

You might be interested in
One way to protect against a security threat to a computer system is to __________. Avoid external links with inconsistent URLs
Makovka662 [10]

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs.

<h3>What is malware?</h3>

Malware is any programme that is purposely designed to disrupt a computer, server, client, or computer network, leak private information, obtain unauthorised access to information or systems, deny users access to information, or otherwise interfere with the user's computer security and privacy.

One way to protect against a security threat to a computer system is to Avoid external links with inconsistent URLs. The reason for this is that such links may contain malware or spyware.

Learn more about Malware:

brainly.com/question/14276107

#SPJ1

7 0
2 years ago
6
Mama L [17]

Answer:

=IF(D3>50; E3; F3) and =IF(A1>60;"Pass";"Fail") are valid IF formulas.

Explanation:

P.S - The exact question is -

To find - Select the correct answer from each drop-down menu. Which IF formulas are valid? _____ and _____ are valid IF formulas.

FIRST BLANK

=IF(D3>50; E3; F3)

=IF(D3>50);( E3; F3)

=IF(10<5;23);("Incorrect")

SECOND BLANK

=IF(A1>60;"Pass";"Fail")

=IF(A1>60); ("Pass"; "Fail")

=IF(A1>60; ("Pass"; "Fail"))

Solution -

An IF structure is built following this pattern:

IF(TEST;IF TRUE;IF FALSE)

So,

The correct option is -

=IF(D3>50; E3; F3) and =IF(A1>60;"Pass";"Fail") are valid IF formulas.

7 0
3 years ago
Consider the following method: static void nPrint(String a, int n) { System.out.println(a.charAt(n)); } What potential error cou
Juliette [100K]
<span>Briefly explain why it is necessary to critique a scientific argument before it is accepted.
</span>
4 0
3 years ago
PartnerServer is a Windows Server 2012 server that holds the primary copy of the PartnerNet.org domain. The server is in a demil
ella [17]

Answer:

i. True

Explanation:

A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.

Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.

PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.

Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.

In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).

A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.

7 0
3 years ago
By default, Outlook displays messages in the Content pane grouped by the
goldfiish [28.3K]

Answer:

By default, Outlook orders messages in the Content pane grouped by dates the messages were received and sorted with the oldest message at the top of the list.

Explanation:

8 0
3 years ago
Other questions:
  • 1. A video card on a modem motherboard would run best in which type of slot?
    10·1 answer
  • Your boss calls you from his home to use the vpn connection you configured for him on his laptop. he has traditionally depended
    6·1 answer
  • Changing the position of the wing will
    9·1 answer
  • The exponential distribution is often used to model what in a queuing system?
    12·1 answer
  • I need help with workplace safety systems please help
    10·1 answer
  • The wildcard character * (asterisk/start) and ? (question mark) are the same and can be use interchangeably.
    6·1 answer
  • Which of the following is NOT a possible combination of values of the variables in this program when it finishes running?
    6·2 answers
  • A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
    12·1 answer
  • Can someone help me debug this please
    6·1 answer
  • which is a correct procedural step for a webpage to render on a user's browser? an information request is sent to an ip address
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!